lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: dudu at diaspar.rdsnet.ro (Vlad Galu)
Subject: Who's to blame for malicious code?

-- a lot of cutting here --

|Hopefully that clarifies my position.

	Let's clarify mine. First of all, I mean no offence. BUT: I've had it
with you. I signed up for "Full Disclosure", not for "Full Disclosure
and Paul Schmechl". So I expect to see and hear information that
strictly serves to my security awareness purposes. Please, rethink your
position. No one is curious of what you think about this and that. I
browsed the archives a little bit and I couldn't find any useful
information in your overall activity.
	If you're not interested in more focused subjects, please send
philosophy to other forums.

| 
|Paul Schmehl (pauls@...allas.edu)
|Adjunct Information Security Officer
|The University of Texas at Dallas
|AVIEN Founding Member
|http://www.utdallas.edu/~pauls/ 

	Impressing.

|
|_______________________________________________
|Full-Disclosure - We believe in it.
|Charter: http://lists.netsys.com/full-disclosure-charter.html
|

----
If it's there, and you can see it, it's real.
If it's not there, and you can see it, it's virtual.
If it's there, and you can't see it, it's transparent.
If it's not there, and you can't see it, you erased it.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040122/934525eb/attachment.bin

Powered by blists - more mailing lists